This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing articles
This article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Computer SecurityWikipedia:WikiProject Computer SecurityTemplate:WikiProject Computer SecurityComputer Security articles
I just created the hardware backdoor article: could you please help out with it? And what exactly are the differences between hardware-Trojans and -backdoors?
I disagree with this choice of words, because it implies that equipment with malicious modifications can never come from a source with a good reputation. Malicious individuals can work for highly-reputable organizations. TooManyFingers (talk) 14:50, 3 August 2021 (UTC)[reply]